Cambridge, Cambridgeshire, United Kingdom Hybrid / WFH Options
TieTalent
skill set. Role Requirements Experience in cybersecurity matters (e.g., threat detection, malware intelligence, cloud security posture management, or identityandaccessmanagement systems). Understanding of the following functions: TCP/IP stack, OSI Model, DHCP, DNS, Subnets, VLANs, Routers, Firewalls (essential More ❯
identity. Job Summary As a Lead Software Engineer, you will be responsible for driving a mission to simplify and streamline services throughout the Identity organization. You will be empowered to make technical and architectural decisions, and to influence the roadmap for your squad and the wider team, working … in partnership with your peers across Product, Program Managementand Engineering. You will contribute to and be part of an engaging, dynamic and inclusive engineering organization, grounded in scrum and agile practices, CI/CD, great collaboration, delivering … solutions grounded in quality and motivated by a commitment to continuous learning and improvement. Identity Engineering delivers Consumer IdentityandAccessManagement (CIAM) capabilities across The Walt Disney Company (TWDC) including but not limited to: D+, Hulu, ESPN+, and Parks. IdentityMore ❯
in banking environments to join a high-impact team driving resilience and security across mission-critical systems. You’ll bring deep expertise across Identity & AccessManagement (IAM) , penetration testing , and 3rd party risk , with strong familiarity with DORA compliance and payments/settlement systems … . What You’ll Do: Lead and execute advanced penetration testing and vulnerability assessments Own IAM strategy and operations , ensuring airtight access controls Drive compliance with DORA (Digital Operational Resilience Act) standards Evaluate and mitigate third-party security risks Safeguard complex payments and settlement infrastructure Operate in fast More ❯
in banking environments to join a high-impact team driving resilience and security across mission-critical systems. You’ll bring deep expertise across Identity & AccessManagement (IAM) , penetration testing , and 3rd party risk , with strong familiarity with DORA compliance and payments/settlement systems … . What You’ll Do: Lead and execute advanced penetration testing and vulnerability assessments Own IAM strategy and operations , ensuring airtight access controls Drive compliance with DORA (Digital Operational Resilience Act) standards Evaluate and mitigate third-party security risks Safeguard complex payments and settlement infrastructure Operate in fast More ❯
We are currently seeking an experienced SailPoint Identity IAM Engineer to join our team in London. In this role, you will be responsible for onboarding applications, configuration of the platform, recertifications, workflows and connectors associated into Identity Security Cloud, ensuring seamless integration and functionality. As the … as Java is also essential. This is an exciting opportunity for someone looking to leverage their skills and expertise in identityandaccessmanagement, while being part of a huge transformation within the company, driving business growth and success. Responsibilities: IAM System Implementation: Participate … in the planning, design, and implementation of IAM systems Issue Resolution: Analyse and resolve IAM related issues and challenges Access Monitoring and Auditing: Regularly monitor and audit access rights to identify unauthorized access attempts and potential security breaches Strategy Development: Contribute to the development More ❯
of technical implementation experience in the domains of SAP application security, role-based access strategies, segregation of duties, identityandaccessmanagement (user provisioning, user access reviews, user terminations), and data security Proficiency in security design, configuration, testing and deployment More ❯
Strategy and Architecture: Develop and implement security strategies aligned with industry standards and best practices, ensuring all systems are secure by design. Risk Management: Assess risks, identify vulnerabilities, and create threat models for new and existing systems to prioritize security controls. Compliance and Governance: Ensure solutions comply with … organizational security standards (e.g., NIST, ISO 27001, GDPR). Solution Design: Lead the design and architecture of security solutions, including identityandaccessmanagement, data protection, network security, and application security. Technical Leadership: Collaborate with cross-functional teams (developers, DevOps, infrastructure) to integrate security … with teams to remediate findings. Incident Response: Develop incident response plans, coordinate responses to security incidents, and drive improvements from lessons learned. Stakeholder Management: Communicate security requirements and risks to both technical and non-technical stakeholders, ensuring alignment with business goals. Essential Skills and Qualifications: Security Clearance: Active More ❯
being collected and analyzed and relevant security alerts are being generated. Automate processes to reduce manual task delivery and enhance process delivery. Vulnerability Management Collaborate with IT and development teams to detect and remediate vulnerabilities across the enterprise in alignment with defined SLAs. Understand current and emerging security … Knowledge of security frameworks and regulatory compliance standards (NIST CSF, SOX ITGC, GDPR, MITRE ATT&CK, etc.) Experience with common industry SIEM and vulnerability management platforms. Experience maintaining the Microsoft Defender platform and other Microsoft security products. Ability … to rank and prioritize vulnerabilities and security recommendations appropriately within the context of the infrastructure and business processes. Experience maintaining identityandaccessmanagement systems including PAM technology and other authentication and authorization control platforms. Experience with Incident Response best practices. Knowledge of cloud More ❯
a handful of Windows machines. Ensure a smooth onboarding/offboarding process and resolving technical issues efficiently. Implement and maintain identityandaccessmanagement (IAM) systems, including SSO and MFA. Evaluate and recommend new technology solutions to support company growth and enhance operational efficiency. … or system administration 2+ years in an InfoSec-related role Technical Skills: Proficiency in managing SaaS platforms like Microsoft 365, and endpoint management tools (e.g., Jumpcloud). Strong understanding of network infrastructure, including firewalls, VPNs, and cloud-based networking solutions. Experience with IAM systems (e.g., Azure … practices. Soft Skills: Excellent problem-solving and communication skills. Ability to collaborate effectively with external partners, such as an MSP. Strong organisational and project management skills. A proactive, growth-oriented mindset with the ability to scale IT processes for a rapidly growing company. Preferred Qualifications Certifications: CompTIA Security+ More ❯
Senior Software Engineer - Client Identity We are seeking a Senior Software Engineer to join a newly formed cybersecurity team based in Europe. This role is pivotal in shaping secure and seamless digital experiences for hundreds of thousands of clients across the UK and Europe. As part of the … ES&F) organization, you will be at the forefront of protecting clients from cyber threats while building and evolving critical identityandaccessmanagement services. Key Responsibilities Design, develop, and enhance modern cloud-native cybersecurity services, spanning database to content delivery networks (CDNs). … Implement secure authentication mechanisms such as Multi-Factor Authentication (MFA) and Passkeys. Integrate with identity providers including Auth0, Transmit Security, and Ping Identity. Build and maintain solutions to detect and mitigate account takeover attempts. Improve the resilience, scalability, and efficiency of cloud-based identity services. Drive More ❯
and cloud services through a Zero Trust approach. This role will be responsible for building and managing Cloud and Firewall security policies and securing access to BRG resources worldwide. A proven cross-disciplinary skillset would be required to efficiently collaborate with Security, Systems and Network teams on large … with or alongside Security Operations Center (SOC) or Network Operations Center (NOC) teams, including managed service providers. Strong understanding of identityandaccessmanagement (IAM), including multi-factor authentication (MFA) and protocols such as SAML, OAuth2, and Kerberos. Working knowledge of authentication platforms and … operational limitations. Highly organized, with the ability to manage multiple priorities and project timelines. Ability to see beyond constraints of the existing environments andidentity opportunities for improvement. Strong organizational ability. More ❯
Kubernetes). Implement and maintain automated deployment pipelines, infrastructure as code (IaC), and configuration management tools (e.g., Terraform) to streamline provisioning andmanagement of cloud resources. Monitor, optimise, and troubleshoot cloud infrastructure performance, security, and costs, utilising monitoring tools and logging frameworks Implement and enforce cloud … security best practices, including identityandaccessmanagement (IAM), data encryption, network security, and compliance with industry regulations (e.g., GDPR, SEC, SOC2). What we look for Bachelor's degree or equivalent experience in Computer Science or related field Proven experience (3 years) as More ❯
IaC and security by design. There's a broad range of responsibilities including handling requests related to system administration, operations governance, Azure subscription management (they have 85 subscriptions), threat/vulnerability managementand incident response, you'll collaborate with engineering teams to evaluate and identify optimal … experience of designing, supporting, securing and building Azure cloud solutions; ideally with AZ-104 certification although it's not necessary You understand subscription management structures and have experience of managing Azure subscriptions You have a good … knowledge of DevOps and IaC concepts You're familiar with cloud based security (e.g. ISO27001, NIST, CIS, OWASP, SOC2) andIdentityandAccessManagement (IAM) within Azure You're familiar with ARM templates and/or Pulumi Ideally you will have automation and scripting More ❯
based security testing to identify and mitigate OWASP Top Ten vulnerabilities . Validate the effectiveness of security controls such as RBAC (Role-Based Access Control), MFA (Multi-Factor Authentication), and API security mechanisms . Ensure compliance with GDPR, ISO 27001, and NCSC Cyber Essentials security standards. 3. Vulnerability … Management & Defect Tracking Identify, document, and track security defects, working closely with development teams to resolve vulnerabilities . Provide detailed security test reports , including risk assessments and mitigation strategies. Collaborate with stakeholders to prioritize and remediate security findings . 4. Collaboration & Security Awareness Work closely with security architects … conduct penetration testing on applications and infrastructure. Knowledge of database security testing , including writing security-focused SQL queries. Familiarity with identityandaccessmanagement (IAM), RBAC, MFA, JWT authentication, and OAuth 2.0 security mechanisms . Strong risk assessment, problem-solving, and communication skills . More ❯
diverse, global teams bring deep industry and functional expertise and a range of perspectives to spark change. BCG delivers solutions through leading-edge management consulting along with technology and design, corporate and digital ventures-and business purpose. We work in a uniquely collaborative model across the firm and … competing demands Providing proactive updates, blocker and dependency insights What You'll Bring Must have +6 years of experience supporting IdentityandAccessManagement in an enterprise environment In-depth knowledge of Google Cloud IAM roles, permissions, and policies Hands-on experience managing service … accounts andidentity federation within GCP Extensive experience with IAM best practices (least privilege, RBAC, SSO) Expertise working with Terraform workflows and python scripts Experience working on an Agile team Nice to have Experience in multi-cloud and hybrid environments IAM implementations Understanding of compliance controls such as More ❯
Cloud), network security, and endpoint protection Hands-on experience with SIEM tools, intrusion detection, firewalls, and threat analysis Knowledge of identityandaccessmanagement (IAM), zero-trust architectures, and encryption techniques Experience conducting vulnerability assessments, and risk analysis Strong analytical and problem-solving skills More ❯
and maintaining Infrastructure as Code (IaC) solutions to automate provisioning and configuration management Implementing security best practices, including identityandaccessmanagement (IAM), encryption, and compliance Working with development and application teams to improve culture and practices Maintaining documentation for infrastructure, processes … tools such as Terraform, ARM Templates, Ansible, or Kubernetes Possess experience with hybrid cloud and multi-cloud environments And have: Progressive computer systems managementand support experience, preferably in a multi-site enterprise-scale environment Experience with Microsoft Azure cloud services and solutions Experience in cloud infrastructure engineering More ❯
to ensure remediation actions are taken in a timely manner Providing oversight, guidance and assurance that supports the continual improvement of security risk management across the organisation Ensuring managed services continuously meet our security requirements, including vendor and supply chain, data centre providers and SaaS services Building effective … matter expertise in at least one security domain, for example, security & risk management, cryptography, security assessment and testing, identityandaccessmanagementand security detection/response/forensics Cloud security knowledge and experience Ability to undertake threat models and risk assessments More ❯
Kent, Broomfield, United Kingdom Hybrid / WFH Options
Tilt Recruitment
experience in cloud security engineering within an enterprise setting, preferably on Microsoft Azure. Solid background in foundational security design – from identityandaccessmanagement to secure networking, container platforms (Kubernetes/AKS), and infrastructure protection. Hands-on knowledge of DevSecOps, IaC (Terraform), CI/… Join a newly formed Cloud Centre of Excellence and shape its future Enjoy a collaborative, agile work environment with true cross-team impact Access cutting-edge tools and technologies in a cloud-first organisation Benefit from a flexible working model, comprehensive training, and career growth This is a More ❯
West Midlands, Bilbrook, Staffordshire, United Kingdom Hybrid / WFH Options
Tilt Recruitment
experience in cloud security engineering within an enterprise setting, preferably on Microsoft Azure. Solid background in foundational security design – from identityandaccessmanagement to secure networking, container platforms (Kubernetes/AKS), and infrastructure protection. Hands-on knowledge of DevSecOps, IaC (Terraform), CI/… Join a newly formed Cloud Centre of Excellence and shape its future Enjoy a collaborative, agile work environment with true cross-team impact Access cutting-edge tools and technologies in a cloud-first organisation Benefit from a flexible working model, comprehensive training, and career growth This is a More ❯
leeds, west yorkshire, yorkshire and the humber, United Kingdom
Accenture
external qualifications that you will have access to, these include: Sponsored training and certifications for AWS, Azure, GCP, CNCF CKAD and CKS,andaccess to many of our other partner product training Accenture’s internal DevSecOps Academy and DevSecOps Academy for Executives Accenture’s internal Master … optimization for cloud environments (AWS, Azure, GCP). You should have a deep understanding of cloud security best practices, including identityandaccessmanagement (IAM), encryption, and security monitoring in the cloud. You have experience integrating security into the CI/CD pipeline using … tools like Snyk, Aqua Security, or HashiCorp Vault for secret management You should have experience in setting up monitoring, logging, and alerting for improved system observability. Tech Stack: GitHub, Kubernetes, Docker,Ansible, Terraform, Gitlab, Synk, Vault, Prometheus, Grafana, Splunk What’s in it for you At Accenture in More ❯
for containerized workloads Oversee Azure VMware Solution (AVS) environments, ensuring seamless integration with existing infrastructure Implement security best practices, including identityandaccessmanagement (IAM), encryption, and network security groups Monitor compliance with industry standards (e.g., ISO, SOC, NIST) and regulatory requirements Continuously evaluate More ❯
practices. Able to design and implement complex infrastructure. Security Knowledge: Knowledge of cloud security best practices. Familiarity and competency with IdentityandAccessManagement (IAM). Troubleshooting and Debugging: Strong troubleshooting and debugging skills. Experience in incident response. Experience working to an Agile methodology More ❯
Malvern, Worcestershire, West Midlands, United Kingdom
Experis
practices. Able to design and implement complex infrastructure. Security Knowledge: Knowledge of cloud security best practices. Familiarity and competency with IdentityandAccessManagement (IAM). Troubleshooting and Debugging: Strong troubleshooting and debugging skills. Experience in incident response. Experience working to an Agile methodology More ❯
practices. Able to design and implement complex infrastructure. Security Knowledge: Knowledge of cloud security best practices. Familiarity and competency with IdentityandAccessManagement (IAM). Troubleshooting and Debugging: Strong troubleshooting and debugging skills. Experience in incident response. Experience working to an Agile methodology More ❯